Telligent Community is a community and collaboration software platform developed by Telligent Systems and was first released in 2004.
95-563: Telligent Community is built on the Telligent Evolution platform, with a variety of core applications running on top of it such as blogs , forums , media galleries , and wikis . Additional applications from third parties using the API's and REST stack can be installed or integrated with the platform. Telligent Community is built with ASP.NET , C# , and Microsoft SQL Server . It is available as downloadable software that can be installed on
190-434: A VPN or the dark web ) to mask their identities online and pose as criminals. Hacking can also have a broader sense of any roundabout solution to a problem, or programming and hardware development in general, and hacker culture has spread the term's broader usage to the general public even outside the profession or hobby of electronics (see life hack ). Reflecting the two types of hackers, there are two definitions of
285-468: A security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them. In a positive connotation, though, hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools (such as
380-449: A zine , before the term blog entered common usage. The first research paper about blogging was Torill Mortensen and Jill Walker Rettberg 's paper "Blogging Thoughts", which analysed how blogs were being used to foster research communities and the exchange of ideas and scholarship, and how this new means of networking overturns traditional power structures. Early blogs were simply manually updated components of common Websites. In 1995,
475-503: A TV station or newspaper, either as an add-on to a traditional media presence (e.g., hosting a radio show or writing a column in a paper newspaper), or as their sole journalistic output. Some institutions and organizations see blogging as a means of "getting around the filter" of media " gatekeepers " and pushing their messages directly to the public. Many mainstream journalists, meanwhile, write their own blogs—well over 300, according to CyberJournalist.net's J-blog list. The first known use of
570-807: A blog on a news site was in August 1998, when Jonathan Dube of The Charlotte Observer published one chronicling Hurricane Bonnie . Some bloggers have moved over to other media. The following bloggers (and others) have appeared on radio and television: Duncan Black (known widely by his pseudonym, Atrios), Glenn Reynolds ( Instapundit ), Markos Moulitsas Zúniga ( Daily Kos ), Alex Steffen ( Worldchanging ), Ana Marie Cox ( Wonkette ), Nate Silver ( FiveThirtyEight.com ), and Ezra Klein (Ezra Klein blog in The American Prospect , now in The Washington Post ). In counterpoint, Hugh Hewitt exemplifies
665-502: A breakdown of the traditional advertising model, where companies can skip over the advertising agencies (previously the only interface with the customer) and contact the customers directly via social media websites. On the other hand, new companies specialised in blog advertising have been established to take advantage of this new development as well. However, there are many people who look negatively on this new development. Some believe that any form of commercial activity on blogs will destroy
760-541: A central timesharing system. The only kind of widespread hardware modification nowadays is case modding . An encounter of the programmer and the computer security hacker subculture occurred at the end of the 1980s, when a group of computer security hackers, sympathizing with the Chaos Computer Club (which disclaimed any knowledge in these activities), broke into computers of American military organizations and academic institutions. They sold data from these machines to
855-572: A commercial blog was on the first business to consumer Web site created in 1995 by Ty, Inc. , which featured a blog in a section called "Online Diary". The entries were maintained by featured Beanie Babies that were voted for monthly by Web site visitors. The modern blog evolved from the online diary where people would keep a running account of the events in their personal lives. Most such writers called themselves diarists, journalists, or journalers. Justin Hall , who began personal blogging in 1994 while
950-556: A comparison of the actual arrival times of local SEPTA trains to their scheduled times after being reportedly frustrated by the discrepancy. Security hackers are people involved with circumvention of computer security. There are several types, including: Hacker culture is an idea derived from a community of enthusiast computer programmers and systems designers in the 1960s around the Massachusetts Institute of Technology 's (MIT's) Tech Model Railroad Club (TMRC) and
1045-670: A large portion of bloggers are professionals and that a well-written blog can help attract employers. Business owners who blog about their business can also run into legal consequences. Mark Cuban , owner of the Dallas Mavericks , was fined during the 2006 NBA playoffs for criticizing NBA officials on the court and in his blog. Blogging can sometimes have unforeseen consequences in politically sensitive areas. In some countries, Internet police or secret police may monitor blogs and arrest blog authors or commentators. Blogs can be much harder to control than broadcast or print media because
SECTION 10
#17328770119831140-493: A live worldwide press conference. The questions and answers were later posted on IsraelPolitik , the country's official political blog. The impact of blogging on the mainstream media has also been acknowledged by governments. In 2009, the presence of the American journalism industry had declined to the point that several newspaper corporations were filing for bankruptcy, resulting in less direct competition between newspapers within
1235-413: A love of learning about technology. They restrict the use of the term cracker to their categories of script kiddies and black hat hackers instead. All three subcultures have relations to hardware modifications. In the early days of network hacking, phreaks were building blue boxes and various variants. The programmer subculture of hackers has stories about several hardware hacks in its folklore, such as
1330-521: A love-hate relationship... They're kids who tended to be brilliant but not very interested in conventional goals It's a term of derision and also the ultimate compliment." Fred Shapiro thinks that "the common theory that 'hacker' originally was a benign term and the malicious connotations of the word were a later perversion is untrue." He found that the malicious connotations were already present at MIT in 1963 (quoting The Tech , an MIT student newspaper), and at that time referred to unauthorized users of
1425-677: A mass media personality who has moved in the other direction, adding to his reach in "old media" by being an influential blogger. Similarly, it was Emergency Preparedness and Safety Tips On Air and Online blog articles that captured Surgeon General of the United States Richard Carmona 's attention and earned his kudos for the associated broadcasts by talk show host Lisa Tolliver and Westchester Emergency Volunteer Reserves- Medical Reserve Corps Director Marianne Partridge. Blogs have also had an influence on minority languages , bringing together scattered speakers and learners; this
1520-646: A mysterious "magic" switch attached to a PDP-10 computer in MIT's AI lab that, when switched off, crashed the computer. The early hobbyist hackers built their home computers themselves from construction kits. However, all these activities have died out during the 1980s when the phone network switched to digitally controlled switchboards, causing network hacking to shift to dialing remote computers with modems when pre-assembled inexpensive home computers were available and when academic institutions started to give individual mass-produced workstation computers to scientists instead of using
1615-511: A new HTML file, and at the start of each month, diary entries were archived into their own folder, which contained a separate HTML page for every day of the month. Then, menus that contained links to the most recent diary entry were updated manually throughout the site. This text-based method of organizing thousands of files served as a springboard to define future blogging styles that were captured by blogging software developed years later. The evolution of electronic and software tools to facilitate
1710-402: A new model of marketing communication from businesses to consumers. Among the various forms of advertising on blog, the most controversial are the sponsored posts . These are blog entries or posts and may be in the form of feedback, reviews, opinion, videos, etc. and usually contain a link back to the desired site using a keyword or several keywords. Blogs have led to some disintermediation and
1805-672: A particular subject or topic, ranging from philosophy , religion , and arts to science , politics , and sports . Others function as more personal online diaries or online brand advertising of a particular individual or company. A typical blog combines text, digital images , and links to other blogs, web pages, and other media related to its topic. Most blogs are primarily textual, although some focus on art ( art blogs ), photographs ( photoblogs ), videos ( video blogs or vlogs ), music ( MP3 blogs ), and audio ( podcasts ). In education, blogs can be used as instructional resources; these are referred to as edublogs . Microblogging
1900-412: A person can create a blog whose authorship is hard to trace by using anonymity technology such as Tor . As a result, totalitarian and authoritarian regimes often seek to suppress blogs and punish those who maintain them. In Singapore, two ethnic Chinese individuals were imprisoned under the country's anti-sedition law for posting anti-Muslim remarks in their blogs. Egyptian blogger Kareem Amer
1995-448: A positive sense, that is, using playful cleverness to achieve a goal. But then, it is supposed, the meaning of the term shifted over the decades and came to refer to computer criminals. As the security-related usage has spread more widely, the original meaning has become less known. In popular usage and in the media, "computer intruders" or "computer criminals" is the exclusive meaning of the word. In computer enthusiast and hacker culture,
SECTION 20
#17328770119832090-429: A pseudonymous "username" (e.g., "Hacker1984"). Sierra and supporters initiated an online discussion aimed at countering abusive online behaviour and developed a Blogger's Code of Conduct , which set out a rules for behaviour in the online space. Hacker A hacker is a person skilled in information technology who achieves goals by non-standard means. The term has become associated in popular culture with
2185-419: A second version of Community Server that targeted as an Enterprise Social Software platform used to create and manage internal employee communities and intranets. Originally branded as Community Server Evolution this was later renamed Telligent Enterprise. Telligent also announced a new Enterprise Reporting platform at its first Community Server Developers Conference in 2008, which was later renamed Harvest. It
2280-466: A slow start, blogging rapidly gained in popularity. Blog usage spread during 1999 and the years following, being further popularized by the near-simultaneous arrival of the first hosted blog tools: An early milestone in the rise in importance of blogs came in 2002, when many bloggers focused on comments by U.S. Senate Majority Leader Trent Lott . Senator Lott, at a party honoring U.S. Senator Strom Thurmond , praised Senator Thurmond by suggesting that
2375-410: A specific date as a "National Day of Civic Hacking" to encourage participation from civic hackers. Civic hackers, though often operating autonomously and independently, may work alongside or in coordination with certain aspects of government or local infrastructure such as trains and buses. For example, in 2008, Philadelphia-based civic hacker William Entriken developed a web application that displayed
2470-526: A student at Swarthmore College , is generally recognized as one of the earlier bloggers, as is Jerry Pournelle . Dave Winer 's Scripting News is also credited with being one of the older and longer running weblogs. The Australian Netguide magazine maintained the Daily Net News on their web site from 1996. Daily Net News ran links and daily reviews of new websites, mostly in Australia. Another early blog
2565-462: A tendency to look down on and disassociate from these overlaps. They commonly refer disparagingly to people in the computer security subculture as crackers and refuse to accept any definition of hacker that encompasses such activities. The computer security hacking subculture, on the other hand, tends not to distinguish between the two subcultures as harshly, acknowledging that they have much in common including many members, political and social goals, and
2660-484: A virtual " corkboard ". Berners-Lee also created what is considered by Encyclopedia Britannica to be "the first 'blog ' " in 1992 to discuss the progress made on creating the World Wide Web and software used for it. From June 14, 1993, Mosaic Communications Corporation maintained their "What's New" list of new websites, updated daily and archived monthly. The page was accessible by a special "What's New" button in
2755-420: A web server or via hosting providers. The current version is Verint Community 12.0 which was released February 2012. The product used to be named Community Server before being rebranded as part of the 5.0 release. Telligent Systems was founded by Rob Howard in 2004, who was previously part of Microsoft's ASP.NET team. Telligent introduced its first product, Community Server, in the fall of 2004. Community Server
2850-412: A week before the company's earnings announcement. He was fired two days after he complied with his employer's request to remove the sensitive material from his blog. In India, blogger Gaurav Sabnis resigned from IBM after his posts questioned the claims made by a management school. Jessica Cutler , aka "The Washingtonienne", blogged about her sex life while employed as a congressional assistant. After
2945-521: Is a criminal financial gain to be had when hacking systems with the specific purpose of stealing credit card numbers or manipulating banking systems . Second, many hackers thrive off of increasing their reputation within the hacker subculture and will leave their handles on websites they defaced or leave some other evidence as proof that they were involved in a specific hack. Third, corporate espionage allows companies to acquire information on products or services that can be stolen or used as leverage within
Telligent Community - Misplaced Pages Continue
3040-466: Is also common within the programmer subculture of hackers. For example, Ken Thompson noted during his 1983 Turing Award lecture that it is possible to add code to the UNIX "login" command that would accept either the intended encrypted password or a particular known password, allowing a backdoor into the system with the latter password. He named his invention the " Trojan horse ". Furthermore, Thompson argued,
3135-456: Is another type of blogging, featuring very short posts. Blog and blogging are now loosely used for content creation and sharing on social media , especially when the content is long-form and one creates and shares content on regular basis, so one could be maintaining a blog on Facebook or blogging on Instagram . A 2022 estimate suggested that there were over 600 million public blogs out of more than 1.9 billion websites. The term "weblog"
3230-409: Is done to get practical barriers out of the way for doing actual work. In special forms, that can even be an expression of playful cleverness. However, the systematic and primary engagement in such activities is not one of the actual interests of the programmer subculture of hackers and it does not have significance in its actual activities, either. A further difference is that, historically, members of
3325-519: Is intended. However, because the positive definition of hacker was widely used as the predominant form for many years before the negative definition was popularized, "hacker" can therefore be seen as a shibboleth , identifying those who use the technically oriented sense (as opposed to the exclusively intrusion-oriented sense) as members of the computing community. On the other hand, due to the variety of industries software designers may find themselves in, many prefer not to be referred to as hackers because
3420-461: Is particularly so with blogs in Gaelic languages . Minority language publishing (which may lack economic feasibility) can find its audience through inexpensive blogging. There are examples of bloggers who have published books based on their blogs, e.g., Salam Pax , Ellen Simonetti , Jessica Cutler , and ScrappleFace . Blog-based books have been given the name blook . A prize for the best blog-based book
3515-416: Is people shouting at each other across the void, but not a lot of mutual understanding". Between 2009 and 2012, an Orwell Prize for blogging was awarded. In the late 2000s , blogs were often used on business websites and for grassroots political activism . There are many different types of blogs, differing not only in the type of content, but also in the way that content is delivered or written. As
3610-455: The C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. However, Thompson disassociated himself strictly from
3705-645: The MIT Artificial Intelligence Laboratory . The concept expanded to the hobbyist home computing community, focusing on hardware in the late 1970s (e.g. the Homebrew Computer Club ) and on software ( video games , software cracking , the demoscene ) in the 1980s/1990s. Later, this would go on to encompass many new definitions such as art, and life hacking . Four primary motives have been proposed as possibilities for why hackers attempt to break into computers and networks. First, there
3800-459: The news media . Blog can also be used as a verb, meaning to maintain or add content to a blog . The emergence and growth of blogs in the late 1990s coincided with the advent of web publishing tools that facilitated the posting of content by non-technical users who did not have much experience with HTML or computer programming . Previously, knowledge of such technologies as HTML and File Transfer Protocol had been required to publish content on
3895-500: The "Online Diary" on the Ty, Inc. Web site was produced and updated manually before any blogging programs were available. Posts were made to appear in reverse chronological order by manually updating text-based HTML code using FTP software in real time several times a day. To users, this offered the appearance of a live diary that contained multiple new entries per day. At the beginning of each new day, new diary entries were manually coded into
Telligent Community - Misplaced Pages Continue
3990-605: The EU Directive 2000/31/EC). In Doe v. Cahill , the Delaware Supreme Court held that stringent standards had to be met to unmask the anonymous bloggers and also took the unusual step of dismissing the libel case itself (as unfounded under American libel law) rather than referring it back to the trial court for reconsideration. In a bizarre twist, the Cahills were able to obtain the identity of John Doe, who turned out to be
4085-477: The Mosaic web browser. In November 1993 Ranjit Bhatnagar started writing about interesting sites, pages and discussion groups he found on the internet, as well as some personal information, on his website Moonmilk, arranging them chronologically in a special section called Ranjit's HTTP Playground. Other early pioneers of blogging, such as Justin Hall , credit him with being an inspiration. The earliest instance of
4180-470: The Soviet secret service, one of them in order to fund his drug addiction. The case was solved when Clifford Stoll , a scientist working as a system administrator, found ways to log the attacks and to trace them back (with the help of many others). 23 , a German film adaption with fictional elements, shows the events from the attackers' perspective. Stoll described the case in his book The Cuckoo's Egg and in
4275-575: The TV documentary The KGB, the Computer, and Me from the other perspective. According to Eric S. Raymond, it "nicely illustrates the difference between 'hacker' and 'cracker'. Stoll's portrait of himself, his lady Martha, and his friends at Berkeley and on the Internet paints a marvelously vivid picture of how hackers and the people around them like to live and how they think." The mainstream media 's current usage of
4370-471: The United States would have been better off had Thurmond been elected president. Lott's critics saw these comments as tacit approval of racial segregation , a policy advocated by Thurmond's 1948 presidential campaign . This view was reinforced by documents and recorded interviews dug up by bloggers. (See Josh Marshall 's Talking Points Memo .) Though Lott's comments were made at a public event attended by
4465-768: The Web, and early Web users therefore tended to be hackers and computer enthusiasts. As of the 2010s, the majority are interactive Web 2.0 websites, allowing visitors to leave online comments, and it is this interactivity that distinguishes them from other static websites. In that sense, blogging can be seen as a form of social networking service . Indeed, bloggers not only produce content to post on their blogs but also often build social relations with their readers and other bloggers. Blog owners or authors often moderate and filter online comments to remove hate speech or other offensive content. There are also high-readership blogs which do not allow comments. Many blogs provide commentary on
4560-464: The academic world started to take part in the programmer subculture of hacking. Since the mid-1980s, there are some overlaps in ideas and members with the computer security hacking community. The most prominent case is Robert T. Morris, who was a user of MIT-AI, yet wrote the Morris worm . The Jargon File hence calls him "a true hacker who blundered". Nevertheless, members of the programmer subculture have
4655-481: The anonymity of Richard Horton . Horton was a police officer in the United Kingdom who blogged about his job under the name "NightJack". Delta Air Lines fired flight attendant Ellen Simonetti because she posted photographs of herself in uniform on an aeroplane and because of comments posted on her blog "Queen of Sky: Diary of a Flight Attendant" which the employer deemed inappropriate. This case highlighted
4750-448: The beginning of the 1970s. An article from MIT's student paper The Tech used the term hacker in this context already in 1963 in its pejorative meaning for someone messing with the phone system. The overlap quickly started to break when people joined in the activity who did it in a less responsible way. This was the case after the publication of an article exposing the activities of Draper and Engressia. According to Raymond, hackers from
4845-472: The blog "Creating Passionate Users", was the target of threats and misogynistic insults to the point that she cancelled her keynote speech at a technology conference in San Diego, fearing for her safety. While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger with threats or insults can be emboldened by the anonymity of the online environment, where some users are known only by
SECTION 50
#17328770119834940-512: The blog in a fairly anonymous manner, some of the descriptions of the firm and some of its people were less than flattering. Sanderson later won a compensation claim case against the British firm, however. On the other hand, Penelope Trunk wrote an upbeat article in The Boston Globe in 2006, entitled "Blogs 'essential' to a good career". She was one of the first journalists to point out that
5035-508: The blog was discovered and she was fired, she wrote a novel based on her experiences and blog: The Washingtonienne: A Novel . As of 2006 , Cutler is being sued by one of her former lovers in a case that could establish the extent to which bloggers are obligated to protect the privacy of their real life associates. Catherine Sanderson, a.k.a. Petite Anglaise , lost her job in Paris at a British accountancy firm because of blogging. Although given in
5130-595: The blogosphere's credibility. Blogging can result in a range of legal liabilities and other unforeseen consequences . Several cases have been brought before the national courts against bloggers concerning issues of defamation or liability . U.S. payouts related to blogging totalled $ 17.4 million by 2009; in some cases these have been covered by umbrella insurance . The courts have returned with mixed verdicts. Internet Service Providers (ISPs), in general, are immune from liability for information that originates with third parties (U.S. Communications Decency Act and
5225-485: The computer community began to differentiate their terminology. Alternative terms such as cracker were coined in an effort to maintain the distinction between hackers within the legitimate programmer community and those performing computer break-ins. Further terms such as black hat , white hat and gray hat developed when laws against breaking into computers came into effect, to distinguish criminal activities from those activities which were legal. Network news' use of
5320-529: The computer security hackers: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang , the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts." The programmer subculture of hackers sees secondary circumvention of security mechanisms as legitimate if it
5415-451: The distinction, grouping legitimate "hackers" such as Linus Torvalds and Steve Wozniak along with criminal "crackers". As a result, the definition is still the subject of heated controversy. The wider dominance of the pejorative connotation is resented by many who object to the term being taken from their cultural jargon and used negatively, including those who have historically preferred to self-identify as hackers. Many advocate using
5510-436: The diversity of media culture, providing opportunities for greater inclusiveness, and making more responsive to consumers." Many bloggers, particularly those engaged in participatory journalism , are amateur journalists, and thus they differentiate themselves from the professional reporters and editors who work in mainstream media organizations. Other bloggers are media professionals who are publishing online, rather than via
5605-514: The documents to be forgeries and presented evidence and arguments in support of that view. Consequently, CBS apologized for what it said were inadequate reporting techniques (see: Little Green Footballs ). The impact of these stories gave greater credibility to blogs as a medium of news dissemination. In Russia, some political bloggers have started to challenge the dominance of official, overwhelmingly pro-government media. Bloggers such as Rustem Adagamov and Alexei Navalny have many followers, and
5700-407: The effective use of the knowledge (which can be to report and help fixing the security bugs, or exploitation reasons) being only rather secondary. The most visible difference in these views was in the design of the MIT hackers' Incompatible Timesharing System , which deliberately did not have any security measures. There are some subtle overlaps, however, since basic knowledge about computer security
5795-474: The issue of personal blogging and freedom of expression versus employer rights and responsibilities, and so it received wide media attention. Simonetti took legal action against the airline for "wrongful termination, defamation of character and lost future wages". The suit was postponed while Delta was in bankruptcy proceedings. In early 2006, Erik Ringmar, a senior lecturer at the London School of Economics ,
SECTION 60
#17328770119835890-486: The latter's nickname for the ruling United Russia party as the "party of crooks and thieves" has been adopted by anti-regime protesters. This led to The Wall Street Journal calling Navalny "the man Vladimir Putin fears most" in March 2012. By 2004, the role of blogs became increasingly mainstream, as political consultants , news services, and candidates began using them as tools for outreach and opinion forming. Blogging
5985-464: The marketplace. Lastly, state-sponsored attacks provide nation states with both wartime and intelligence collection options conducted on, in, or through cyberspace . The main basic difference between programmer subculture and computer security hacker is their mostly separate historical origin and development. However, the Jargon File reports that considerable overlap existed for the early phreaking at
6080-526: The media, no major media organizations reported on his controversial comments until after blogs broke the story. Blogging helped to create a political crisis that forced Lott to step down as majority leader. Similarly, blogs were among the driving forces behind the " Rathergate " scandal. Television journalist Dan Rather presented documents on the CBS show 60 Minutes that conflicted with accepted accounts of President Bush's military service record. Bloggers declared
6175-433: The more recent and nuanced alternate terms when describing criminals and others who negatively take advantage of security flaws in software and hardware. Others prefer to follow common popular usage, arguing that the positive form is confusing and unlikely to become widespread in the general public. A minority still use the term in both senses despite the controversy, leaving context to clarify (or leave ambiguous) which meaning
6270-651: The person they suspected: the town's mayor, Councilman Cahill's political rival. The Cahills amended their original complaint, and the mayor settled the case rather than going to trial. In January 2007, two prominent Malaysian political bloggers, Jeff Ooi and Ahirudin Attan , were sued by a pro-government newspaper, The New Straits Times Press (Malaysia) Berhad, Kalimullah bin Masheerul Hassan, Hishamuddin bin Aun and Brenden John a/l John Pereira over alleged defamation. The plaintiff
6365-614: The popularity of blogging continued to rise (as of 2006), the commercialisation of blogging is rapidly increasing. Many corporations and companies collaborate with bloggers to increase advertising and engage online communities with their products. In the book Fans, Bloggers, and Gamers , Henry Jenkins stated that "Bloggers take knowledge into their own hands, enabling successful navigation within and between these emerging knowledge cultures. One can see such behaviour as co-optation into commodity culture insofar as it sometimes collaborates with corporate interests, but one can also see it as increasing
6460-477: The popularization of the terms. Before blogging became popular, digital communities took many forms, including Usenet , commercial online services such as GEnie , Byte Information Exchange (BIX) and the early CompuServe , e-mail lists , and Bulletin Board Systems (BBS). In the 1990s, Internet forum software created running conversations with "threads". Threads are topical connections between messages on
6555-401: The primary meaning is a complimentary description for a particularly brilliant programmer or technical expert. A large segment of the technical community insist the latter is the correct usage, as in the Jargon File definition. Sometimes, "hacker" is simply used synonymously with " geek ": "A true hacker is not a group person. He's a person who loves to stay up all night, he and the machine in
6650-519: The production and maintenance of Web articles posted in reverse chronological order made the publishing process feasible for a much larger and less technically-inclined population. Ultimately, this resulted in the distinct class of online publishing that produces blogs we recognize today. For instance, the use of some sort of browser-based software is now a typical aspect of "blogging". Blogs can be hosted by dedicated blog hosting services , on regular web hosting services , or run using blog software. After
6745-425: The programmer subculture of hackers were working at academic institutions and used the computing environment there. In contrast, the prototypical computer security hacker had access exclusively to a home computer and a modem. However, since the mid-1990s, with home computers that could run Unix-like operating systems and with inexpensive internet home access being available for the first time, many people from outside of
6840-452: The programmer subculture usually work openly and use their real name, while computer security hackers prefer secretive groups and identity-concealing aliases. Also, their activities in practice are largely distinct. The former focus on creating new and improving existing infrastructure (especially the software environment they work with), while the latter primarily and strongly emphasize the general act of circumvention of security measures, with
6935-452: The reputation of their employer, either in a positive way, if the employee is praising the employer and its workplaces, or in a negative way, if the blogger is making negative comments about the company or its practices. In general, attempts by employee bloggers to protect themselves by maintaining anonymity have proved ineffective. In 2009, a controversial and landmark decision by The Hon. Mr Justice Eady refused to grant an order to protect
7030-425: The same circulation area. Discussion emerged as to whether the newspaper industry would benefit from a stimulus package by the federal government. U.S. President Barack Obama acknowledged the emerging influence of blogging upon society by saying, "if the direction of the news is all blogosphere, all opinions, with no serious fact-checking, no serious attempts to put stories in context, then what you will end up getting
7125-449: The self-designation of hobbyists as hackers is generally acknowledged and accepted by computer security hackers, people from the programming subculture consider the computer intrusion related usage incorrect, and emphasize the difference between the two by calling security breakers "crackers" (analogous to a safecracker ). The controversy is usually based on the assertion that the term originally meant someone messing about with something in
7220-467: The telephone network, that is, the phreaker movement that developed into the computer security hacker subculture of today. Civic hackers use their security and/or programming acumens to create solutions, often public and open-sourced , addressing challenges relevant to neighborhoods, cities, states or countries and the infrastructure within them. Municipalities and major government agencies such as NASA have been known to host hackathons or promote
7315-434: The term consistently pertains primarily to criminal activities, despite attempts by the technical community to preserve and distinguish the original meaning. Today, the mainstream media and general public continue to describe computer criminals, with all levels of technical sophistication, as "hackers" and do not generally make use of the word in any of its non-criminal connotations. Members of the media sometimes seem unaware of
7410-406: The term may be traced back to the early 1980s. When the term, previously used only among computer enthusiasts, was introduced to wider society by the mainstream media in 1983, even those in the computer community referred to computer intrusion as hacking, although not as the exclusive definition of the word. In reaction to the increasing media use of the term exclusively with the criminal connotation,
7505-582: The top of the web page . In the 2000s, blogs were often the work of a single individual, occasionally of a small group, and often covered a single subject or topic. In the 2010s, "multi-author blogs" (MABs) emerged, featuring the writing of multiple authors and sometimes professionally edited . MABs from newspapers , other media outlets , universities, think tanks , advocacy groups , and similar institutions account for an increasing quantity of blog traffic . The rise of Twitter and other " microblogging " systems helps integrate MABs and single-author blogs into
7600-426: The underlying platform that both run on is now referred to as Telligent Evolution. The Social Analytics suite was renamed Telligent Analytics. Blog software A blog (a truncation of " weblog ") is an informational website consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order so that the most recent post appears first, at
7695-432: The word "hacker": Mainstream usage of "hacker" mostly refers to computer criminals, due to the mass media usage of the word since the 1990s. This includes what hacker jargon calls script kiddies , less skilled criminals who rely on tools written by others with very little knowledge about the way they work. This usage has become so predominant that the general public is largely unaware that different meanings exist. Though
7790-431: The word holds a negative denotation in many of those industries. A possible middle ground position has been suggested, based on the observation that "hacking" describes a collection of skills and tools which are used by hackers of both descriptions for differing reasons. The analogy is made to locksmithing , specifically picking locks, which is a skill which can be used for good or evil. The primary weakness of this analogy
7885-501: Was Wearable Wireless Webcam, an online shared diary of a person's personal life combining text, digital video, and digital pictures transmitted live from a wearable computer and EyeTap device to a web site in 1994. This practice of semi-automated blogging with live video together with text was referred to as sousveillance , and such journals were also used as evidence in legal matters. Some early bloggers, such as The Misanthropic Bitch, who began in 1997, referred to their online presence as
7980-503: Was among the first national governments to set up an official blog. Under David Saranga , the Israeli Ministry of Foreign Affairs became active in adopting Web 2.0 initiatives, including an official video blog and a political blog . The Foreign Ministry also held a microblogging press conference via Twitter about its war with Hamas , with Saranga answering questions from the public in common text-messaging abbreviations during
8075-559: Was an effort to protect the public. The case was dismissed for lack of personal jurisdiction, and Traffic Power failed to appeal within the allowed time. In 2009, NDTV issued a legal notice to Indian blogger Kunte for a blog post criticizing their coverage of the Mumbai attacks . The blogger unconditionally withdrew his post, which resulted in several Indian bloggers criticizing NDTV for trying to silence critics. Employees who blog about elements of their place of employment can begin to affect
8170-632: Was arrested in April 2007 for anti-government writings in his blog. Monem is a member of the then banned Muslim Brotherhood . After the 2011 Egyptian revolution , the Egyptian blogger Maikel Nabil Sanad was charged with insulting the military for an article he wrote on his personal blog and sentenced to three years. After expressing opinions in his personal blog about the state of the Sudanese armed forces, Jan Pronk , United Nations Special Representative for Sudan ,
8265-495: Was charged with insulting the Egyptian president Hosni Mubarak and an Islamic institution through his blog. It is the first time in the history of Egypt that a blogger was prosecuted. After a brief trial session that took place in Alexandria , the blogger was found guilty and sentenced to prison terms of three years for insulting Islam and inciting sedition and one year for insulting Mubarak. Egyptian blogger Abdel Monem Mahmoud
8360-516: Was coined by Jorn Barger on December 17, 1997. The short form "blog" was coined by Peter Merholz , who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in May 1999. Shortly thereafter, Evan Williams at Pyra Labs used "blog" as both a noun and verb ("to blog", meaning "to edit one's weblog or to post to one's weblog") and devised the term "blogger" in connection with Pyra Labs' Blogger product, leading to
8455-630: Was established by politicians and political candidates to express opinions on war and other issues and cemented blogs' role as a news source. (See Howard Dean and Wesley Clark .) Even politicians not actively campaigning, such as the UK's Labour Party's Member of Parliament (MP) Tom Watson , began to blog to bond with constituents. In January 2005, Fortune magazine listed eight bloggers whom business people "could not ignore": Peter Rojas , Xeni Jardin , Ben Trott , Mena Trott , Jonathan Schwartz , Jason Goldman, Robert Scoble , and Jason Calacanis . Israel
8550-455: Was given three days notice to leave Sudan. The Sudanese army had demanded his deportation. In Myanmar , Nay Phone Latt, a blogger, was sentenced to 20 years in jail for posting a cartoon critical of head of state Than Shwe . One consequence of blogging is the possibility of online or in-person attacks or threats against the blogger, sometimes without apparent reason. In some cases, bloggers have faced cyberbullying . Kathy Sierra , author of
8645-462: Was initiated in 2005, the Lulu Blooker Prize . However, success has been elusive offline, with many of these books not selling as well as their blogs. The book based on Julie Powell 's blog "The Julie/Julia Project" was made into the film Julie & Julia , apparently the first to do so. Consumer-generated advertising is a relatively new and controversial development, and it has created
8740-549: Was one of the first analytics suites for enterprise collaboration software, and provides social analytics including sentiment analysis , social fingerprints, and buzz analysis on social networking sites such as Twitter . Telligent rebranded all of its products on June 23, 2009 at the Enterprise 2.0 conference when it launched its new Evolution platform product suite. Community Server became known as Telligent Community, Community Server Evolution became known as Telligent Enterprise and
8835-678: Was one of the first integrated community platforms that brought together blogs, photo galleries, wikis, forums, user profiles and more. Community Server was based on the merger of three then-widely used open source ASP.NET projects: the ASP.NET Forums, nGallery photo gallery, and .Text blog engine. The people behind those projects (Scott Watermasysk, Jason Alexander, and Rob Howard) joined together as Telligent Systems and along with several other software developers created Community Server 1.0. Between 2004 and 2009 Community Server steadily grew in scope, features, and capabilities. In 2008 Telligent Systems released
8930-495: Was ordered by the convenor of his department to "take down and destroy" his blog in which he discussed the quality of education at the school. Mark Jen was terminated in 2005 after 10 days of employment as an assistant product manager at Google for discussing corporate secrets on his personal blog, then called 99zeros and hosted on the Google-owned Blogger service. He blogged about unreleased products and company finances
9025-723: Was supported by the Malaysian government. Following the suit, the Malaysian government proposed to "register" all bloggers in Malaysia to better control parties against their interests. This is the first such legal case against bloggers in the country. In the United States, blogger Aaron Wall was sued by Traffic Power for defamation and publication of trade secrets in 2005. According to Wired magazine, Traffic Power had been "banned from Google for allegedly rigging search engine results." Wall and other " white hat " search engine optimization consultants had exposed Traffic Power in what they claim
#982017